Book Image

Infrastructure Monitoring with Amazon CloudWatch

By : Ewere Diagboya
Book Image

Infrastructure Monitoring with Amazon CloudWatch

By: Ewere Diagboya

Overview of this book

CloudWatch is Amazon’s monitoring and observability service, designed to help those in the IT industry who are interested in optimizing resource utilization, visualizing operational health, and eventually increasing infrastructure performance. This book helps IT administrators, DevOps engineers, network engineers, and solutions architects to make optimum use of this cloud service for effective infrastructure productivity. You’ll start with a brief introduction to monitoring and Amazon CloudWatch and its core functionalities. Next, you’ll get to grips with CloudWatch features and their usability. Once the book has helped you develop your foundational knowledge of CloudWatch, you’ll be able to build your practical skills in monitoring and alerting various Amazon Web Services, such as EC2, EBS, RDS, ECS, EKS, DynamoDB, AWS Lambda, and ELB, with the help of real-world use cases. As you progress, you'll also learn how to use CloudWatch to detect anomalous behavior, set alarms, visualize logs and metrics, define automated actions, and rapidly troubleshoot issues. Finally, the book will take you through monitoring AWS billing and costs. By the end of this book, you'll be capable of making decisions that enhance your infrastructure performance and maintain it at its peak.
Table of Contents (16 chapters)
Section 1: Introduction to Monitoring and Amazon CloudWatch
Section 2: AWS Services and Amazon CloudWatch

Case study of Amazon EKS logging and monitoring

You are a DevOps engineer who has just been employed to help migrate a couple of monolithic applications into microservices. The choice made for managing the microservices is to use a container-based system due to the advantages containers have. The company has gone further to say that they will be using Amazon EKS as the service for orchestration of the Docker images that have been built. Your company has just got the ISO 27001 certification for information security. So, things such as auditing applications and services are taken very seriously. Logs of applications are to be kept and audited from time to time to ensure that the company continues to remain compliant. Added to that, close monitoring of the applications and notification alarms needs to be configured to receive notifications when applications have any kind of behavior that is not normal.


From the preceding case study, a couple of things need to be taken...